CVE-2022-20762

A vulnerability in the Common Execution Environment (CEE) ConfD CLI of Cisco Ultra Cloud Core - Subscriber Microservices Infrastructure (SMI) software could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to insufficient access control in the affected CLI. An attacker could exploit this vulnerability by authenticating as a CEE ConfD CLI user and executing a specific CLI command. A successful exploit could allow an attacker to access privileged containers with root privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:ultra_cloud_core_-_subscriber_microservices_infrastructure:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ultra_cloud_core_-_subscriber_microservices_infrastructure:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:43

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccsmi-prvesc-BQHGe4cm - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccsmi-prvesc-BQHGe4cm - Vendor Advisory

24 Jul 2023, 13:45

Type Values Removed Values Added
CWE CWE-863 NVD-CWE-Other

Information

Published : 2022-04-06 19:15

Updated : 2024-11-21 06:43


NVD link : CVE-2022-20762

Mitre link : CVE-2022-20762

CVE.ORG link : CVE-2022-20762


JSON object : View

Products Affected

cisco

  • ultra_cloud_core_-_subscriber_microservices_infrastructure
CWE
CWE-284

Improper Access Control

NVD-CWE-Other